TIP: Click on subject to list as thread! ANSI
echo: osdebate
to: John Beamish
from: Geo
date: 2006-12-03 01:01:32
subject: Re: PDF / IE exploit

From: "Geo" 

4 days later and still no patch or word on when it will be available..

Geo.

"John Beamish"  wrote in message
news:op.tjvvyomgm6tn4t{at}dellblack.wlfdle.phub.net.cable.rogers.com...
> http://www.theregister.co.uk/2006/12/01/adobe_vuln/
>
> A critical vulnerability has been identified in Adobe's Acrobat and Reader
> software which affects Internet Explorer users.
>
> As well as causing crashes, the frailty could allow a botnet to take
> control of the whole computer when a PDF is opened within Explorer.
>
>
> The hole is present in Acrobat Standard and Professional versions 7.0.0 to
> 7.0.8, and Adobe Reader 7.0.0 to 7.0.8. Only Microsoft's browser is
> vulnerable.
>
> Adobe's programmers are working on a patch, which should be available on
> its support site soon. In the meantime, deleting AcroPDF.dll from the will
> prevent Explorer from opening PDFs in the browser window.
>
> Adobe's advisory is here.(JB:  embedded link:
> http://www.adobe.com/support/security/advisories/apsa06-02.html )

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270
@PATH: 379/45 1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.